The real goal: reduce account takeover risk
Password security isn't about "having complicated passwords." It's about preventing:
- credential reuse across services
- predictable passwords that can be guessed
- phishing-based capture
- unauthorized access via shared accounts
- access that remains active after staff changes
In practice, a secure password approach is built around two pillars:
- strong unique passwords (or passphrases)
- multi-factor authentication (MFA)
Use a password manager
They solve most problems
A password manager makes it realistic to use strong, unique passwords everywhere.
It helps you:
- generate and store long random passwords
- avoid reuse across accounts
- share access safely (without texting a password)
- revoke access cleanly when roles change
- audit password health over time
If your organization uses even a handful of online systems (email, website admin, banking, vendor portals), a password manager is one of the highest ROI security moves available.
Prefer passphrases over "complex" passwords
If you are not using a password manager, a long passphrase is usually better than a short complex password.
Good:
- long
- memorable
- hard to guess
Example pattern:
- 4-6 unrelated words + a separator
- add one number or symbol only if required
Avoid:
- common phrases
- obvious substitutions (P@ssw0rd)
- anything tied to your organization name, town, or mascot
Length is the advantage. Predictability is the problem.
Never reuse passwords
Especially for email
Password reuse is one of the most common failure points. If a password is exposed in any breach and reused elsewhere, attackers will immediately try it against higher-value accounts like email.
Email matters not because someone wants to read your messages, but because email is how most services verify identity. If an attacker gains access to your inbox, they can often trigger password resets for other accounts and intercept the reset links or verification codes. That can lead to account takeovers across systems tied to that email address: banking and credit card portals, payroll services, vendor accounts, social media, domain registrars, and website admin panels.
In other words, email is the key to the entire building because it controls the keys to all the other doors. Treat email credentials as your highest-value login: unique password, long and strong, stored in a password manager, and protected with multi-factor authentication.
Email is the master key.
Email isn't just messages. It is identity recovery for most accounts.
If an attacker controls your inbox, they can reset passwords for banking, hosting, domain access, and administrative systems tied to that address.
Now the attacker not only has access to your financial information, they may have access to all of your customer's financial information as well.
Turn on multi-factor authentication (MFA) wherever possible
MFA blocks many account takeover attempts even if a password is compromised.
Enable MFA for:
- email accounts
- domain registrar accounts
- hosting control panels
- WordPress admin users
- payment processors and banking tools
- password manager account itself
If you implement only one change from this article, make it: MFA for email and registrar access.
Use safe methods for sharing access
If you must share credentials, avoid:
- email threads
- texts
- spreadsheets
- sticky notes
- chat messages
Use:
- password manager sharing
- one-time secure sharing tools (if needed)
- role-based accounts that can be revoked
The goal is to be able to remove access cleanly without changing passwords everywhere.
Watch for phishing
Because it defeats "strong passwords"
Phishing is the most common way strong passwords still get compromised.
Basic habits:
- be cautious with login links in emails
- verify the domain carefully (lookalikes are common)
- don't enter credentials after clicking unknown links
- treat "urgent account warning" messages with skepticism
- if unsure, navigate directly to the website instead of clicking
MFA helps here too, because it adds a second layer even if a password is entered in the wrong place.
Common password myths (and what to do instead)
"We change passwords every month."
Frequent forced changes often cause weaker behavior (incrementing numbers, reusing patterns). A better approach is:
- strong unique passwords
- MFA
- change passwords immediately if compromise is suspected or after staff turnover
"We use 'strong password requirements,' so we're fine."
Strength meters don't prevent reuse, sharing, or phishing. Use a password manager and MFA.
"No one would target us."
Most attacks are automated. They don't care who you are. They care whether your credentials work.
A practical password checklist for organizations
- Use a password manager for the organization
- Enable MFA for email, registrar, hosting, and admin accounts
- Use unique passwords everywhere (no reuse)
- Don't share admin logins
- Remove access promptly when roles change
- Treat email as the highest-value account
- Be cautious with login links and "urgent" messages
This is enough to be far safer than most organizations.